CN110213300A - A kind of intelligence edge Internet of Things agent apparatus - Google Patents

A kind of intelligence edge Internet of Things agent apparatus Download PDF

Info

Publication number
CN110213300A
CN110213300A CN201910615042.9A CN201910615042A CN110213300A CN 110213300 A CN110213300 A CN 110213300A CN 201910615042 A CN201910615042 A CN 201910615042A CN 110213300 A CN110213300 A CN 110213300A
Authority
CN
China
Prior art keywords
internet
things
mpk
sensor
agent apparatus
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910615042.9A
Other languages
Chinese (zh)
Inventor
卜权
张振寰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiayuan Technology Co Ltd
Original Assignee
Jiayuan Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiayuan Technology Co Ltd filed Critical Jiayuan Technology Co Ltd
Priority to CN201910615042.9A priority Critical patent/CN110213300A/en
Publication of CN110213300A publication Critical patent/CN110213300A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C19/00Electric signal transmission systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Medical Informatics (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Algebra (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)

Abstract

This application involves intelligent edge Internet of Things agent apparatus characterized by comprising Internet of Things communication module accesses perception control system by Internet of Things for downlink;Local area network communications module is connected to basic service system, resource exchange system, O&M managing and control system by local area network for uplink;Local area network communications module, for connecting custom system by communication network.The present invention realize can intelligently various perception datas of collection in worksite, to realize unmanned automation power grid fortune inspection.

Description

A kind of intelligence edge Internet of Things agent apparatus
Technical field
This application involves electrical equipment technical field more particularly to a kind of intelligent edge Internet of Things agent apparatus.
Background technique
Fig. 1 is the schematic diagram of electric power internet of things concept model, as shown, electric power internet of things concept model by user domain, Target object domain, perception control domain, service provide domain, O&M control domain and Resource Exchange domain composition.Wherein, perception control domain is The entity sets of the software and hardware system of all kinds of acquisition perceptive object information and manipulation control object.Perception control domain, which can be realized, to be directed to Localization perception, collaboration and the manipulation of physical world object, and the excuse of long-range management and service is provided for other domains.Perception control Domain system processed typically comprises sensor network system, label recognition system, location information system, audio/video information acquisition system The entities such as system, intelligent equipment interface system.
Internet of Things agency in edge is that support perception control system and other systems interconnect, and realize perception control domain local management Entity.Internet of Things agency in edge can provide protocol conversion, address of cache, data processing, information fusion, safety certification, equipment pipe The functions such as reason.From device definition angle, edge Internet of Things act on behalf of the equipment that can be autonomous working, can also control with other perception Integration of equipments is a function device.
Power grid fortune inspection is the work extremely taken time and effort, such as the oil chromatography detection of power transformation device, generally requires manually to carry out Chemical examination detection is sampled and takes back, not only time-consuming but also consumption manpower may just compare late until detecting that result is intervened again. After internet of things sensors puts into operation, power transformation station equipment can be monitored at any time, data to edge Internet of Things are uploaded in time and act on behalf of It is analyzed, once discovery goes wrong, just can be handled at the first time.A kind of intelligent edge Internet of Things of this field urgent need Agent apparatus, can intelligently various perception datas of collection in worksite, to realize unmanned automation power grid fortune inspection.
Summary of the invention
To overcome the problems in correlation technique, the application provides a kind of intelligent edge Internet of Things agent apparatus.
According to the embodiment of the present application, a kind of intelligent edge Internet of Things agent apparatus is provided characterized by comprising
Internet of Things communication module accesses perception control system by Internet of Things for downlink;
Local area network communications module is connected to basic service system, resource exchange system, O&M pipe by local area network for uplink Control system;
Local area network communications module, for connecting custom system by communication network.
Preferably, further include encrypting module, be used in Internet of Things and local area network encrypted transmission information in linkage.
Preferably, Internet of Things communication module downlink by Internet of Things access perception control system in sensor network node, Label read-write apparatus, audio & video equipment, intelligent equipment and location information system.
Preferably, encrypted transmission includes encrypting module in linkage in Internet of Things and local area network:
The ciphertext E of n sensor will be sent to1,E2,E3,…EnIt polymerize and encrypts to obtain E0For in Internet of Things online broadcast.
Preferably, further includes:
Each sensor negotiates the basic point G of creation elliptic curve E;
The Internet of Things communication module obtains G.
Preferably, further includes:
Sensor i creates respective key ki
Calculate respective public key MPKi=ki·G;
The Internet of Things communication module obtains MPK from Internet of Thingsi
Preferably, by MPKiEncrypted transmission includes: to Internet of Things communication module
The encrypting module generates Your Majesty's key mpk using key algorithmiWith master key mski
By Your Majesty's key mpkiSensor i is sent to by Internet of Things;
Sensor i is calculatedWherein, | | to press or operator,For exclusive or Operation, IDiFor the ID of sensor i.
Preferably, further includes:
The information that be sent to sensor i that the encrypting module receives the local area network communications module from telenet With its IDiConstitute message MRi
By MPKiDecryption reduction;
Using the MPK of reductioniBy MRiEncryption obtains Ei
Preferably, by MPKiDecryption restores
The encrypting module uses master key mskiWith its IDiGenerate key ski
Using Your Majesty's key mskiWith key skiTo the MPK from the sensoriThe MPK restored is decryptediWith And ID';
If ID'=IDi, then confirm the MPK that decryption obtainsiIt is true.
Preferably, using the MPK of reductioniBy MRiEncryption obtains EiInclude:
The encrypting module chooses random number ri, MRiWith the MPK of reductioniSum be encoded to the point on elliptic curve
Calculate C1i=riG;
It calculates
Construct Ei=(C1i, C2i)。
The ciphertext E of n sensor will be sent to1,E2,E3,…EnIt polymerize and encrypts to obtain E0Include:
The encrypting module calculates
Decoding obtains
Obtain addition polymerization result
The present invention realize can intelligently various perception datas of collection in worksite, to realize unmanned automation power grid fortune Inspection.
The additional aspect of the application and advantage will be set forth in part in the description, and will partially become from the following description It obtains obviously, or recognized by the practice of the application.It should be understood that above general description and following detailed description are only Be it is exemplary and explanatory, the application can not be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is the schematic diagram of electric power internet of things concept model;
Fig. 2 is intelligent edge Internet of Things in a kind of electric power Internet of things system reference hierarchy framework shown in an exemplary embodiment The schematic diagram of agent apparatus;
Fig. 3 is the schematic diagram of the intelligent edge Internet of Things agent apparatus communication references system of Fig. 2.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended The example of device and method being described in detail in claims, some aspects of the invention are consistent.
Following disclosure provides many different embodiments or example is used to realize the different structure of the application.For letter Change disclosure herein, hereinafter the component of specific examples and setting are described.Certainly, they are merely examples, and Purpose does not lie in limitation the application.In addition, the application can in different examples repeat reference numerals and/or letter.It is this heavy It is that for purposes of simplicity and clarity, itself is more than the relationship discussed between various embodiments and/or setting again.This Outside, this application provides various specific techniques and material example, but those of ordinary skill in the art may be aware that The use of the applicability and/or other materials of other techniques.In addition, fisrt feature described below is in Second Eigenvalue "upper" Structure may include embodiment that the first and second features are formed as directly contacting, also may include that other feature is formed in Embodiment between first and second features, such first and second feature may not be direct contact.
In the description of the present application, it should be noted that unless otherwise specified and limited, term " installation ", " connected ", " connection " shall be understood in a broad sense, for example, it may be mechanical connection or electrical connection, the connection being also possible to inside two elements can , can also indirectly connected through an intermediary, for the ordinary skill in the art to be to be connected directly, it can basis Concrete condition understands the concrete meaning of above-mentioned term.
Fig. 2 is intelligent edge Internet of Things in a kind of electric power Internet of things system reference hierarchy framework shown in an exemplary embodiment The schematic diagram of agent apparatus, as shown, intelligent edge Internet of Things agent apparatus of the invention includes:
Internet of Things communication module accesses perception control system by Internet of Things for downlink;
Local area network communications module is connected to basic service system, resource exchange system, O&M pipe by local area network for uplink Control system;
Local area network communications module, for connecting custom system by communication network, specifically, mobile communication can be passed through The various modes such as network, access in radio private network, satellite spatial communication are linked into custom system, and custom system can be mobile communication Terminal or various forms of computer terminals.
Industrial Internet of Things is intended to promote traditional industry to networking, intelligentized new stage, application have real-time, The features such as open, principle are that different equipment machine is networked, and obtain set respectively by sensor thereon or controller Standby work condition state or environmental information, analysis optimization equipment work efficiency energy consumption carry out equipment management and feedback control.
Intelligent edge Internet of Things agent apparatus of the invention by industrial Internet of Things realize can intelligently collection in worksite it is each Kind perception data, and basic service system, resource exchange system, O&M managing and control system are connected to by conventional local area network, pass through Communication network connects custom system, therefore user can remotely know that intelligent edge Internet of Things act on behalf of such as change collected from Internet of Things Various perception datas in power station, and scheduled basis service system, resource exchange system, O&M managing and control system carry out various controls System, various automation control logics can also be carried in basic service system, issue switch in time automatically according to perception data Intelligent edge Internet of Things agent apparatus is given in the instruction of movement, and intelligent edge Internet of Things agent apparatus then passes through Internet of Things and goes control switch Movement, to realize unmanned automation power grid fortune inspection.
Preferably, further include encrypting module, be used in Internet of Things and local area network encrypted transmission information in linkage.
Internet of Things, because economic value is more and more great, is also faced with many peaces while realizing more applications It is complete to threaten.Intelligent edge Internet of Things agent apparatus, which undertakes, accesses edge net for switches various in substation and sensor network node etc. Important function be particularly susceptible to various network attacks and threaten because to be directly connected to telecommunications network.This is excellent It selects embodiment by addition encrypting module, realizes safer Internet of Things edge access, so that it is guaranteed that substation safety is run, Not by extraneous illegal invasion.
Fig. 3 is the schematic diagram of the intelligent edge Internet of Things agent apparatus communication references system of Fig. 2, and Internet of Things communication module downlink is logical Cross sensor network node, the label read-write apparatus, audio & video equipment, intelligent equipment in Internet of Things access perception control system And location information system.
Preferably, encrypted transmission includes encrypting module in linkage in Internet of Things and local area network:
The ciphertext E of n sensor will be sent to1,E2,E3,…EnIt polymerize and encrypts to obtain E0For in Internet of Things online broadcast.
For example, n sensor can be deployed in including crusing robot, infrared camera, the monitoring of casing dielectric loss, wireless temperature Spend monitoring, partial discharge monitoring, accumulator monitoring etc..
Preferably, further includes:
Each sensor negotiates the basic point G of creation elliptic curve E;
The Internet of Things communication module obtains G.
The present apparatus uses elliptic curve ECC Encryption Algorithm in Internet of Things, and safety is stronger, and calculation amount is lighter.
Preferably, further includes:
Sensor i creates respective key ki
Calculate respective public key MPKi=ki·G;
The Internet of Things communication module obtains MPK from Internet of Thingsi
The key of multiple sensors is produced certain relevance by this preferred embodiment, unified to carry out encryption handling, because The various scenes such as this multiple sensors especially suitable for substation so that more sensors are encrypted jointly, so as to point Booth calculates pressure, further improves security performance.
Previous equipment on-line monitoring existence perception not comprehensively, element power consumption is high, integrated level is low, is not easy to extend etc. lacks Point.Used in an on-the-spot test of the invention, ubiquitous electric power Internet of Things to minimize, low-power consumption, high integration and highly reliable Property be target, deployment video, temperature and humidity, partial discharge, 65 sets of induction elements such as Intellisenses element and crusing robot such as vibration Deployment, the key of multiple sensors produces certain relevance, unified to carry out encryption handling, to realize transformer, group Close electrical, switchgear and auxiliary equipment apparatus body and ambient condition comprehensive depth perception, be the operation management of power grid wisdom and Comprehensive energy efficiency evaluation is laid a solid foundation.
Preferably, by MPKiEncrypted transmission includes: to Internet of Things communication module
The encrypting module generates Your Majesty's key mpk using key algorithmiWith master key mski
By Your Majesty's key mpkiSensor i is sent to by Internet of Things;
Sensor i is calculatedWherein, | | to press or operator,For exclusive or Operation, IDiFor the ID of sensor i.
The Encryption Algorithm calculation amount of this preferred embodiment is low, and has good concealment.This preferred embodiment is by kiEncryption After be transmitted to each sensor, therefore further improve safety.In addition, this preferred embodiment joined biography in ciphering process The identity information ID of sensori, to carry out equipment identification when facilitating a large amount of similar devices networkings in Internet of Things, and further mention The high safety of encryption.
Preferably, further includes:
The information that be sent to sensor i that the encrypting module receives the local area network communications module from telenet With its IDiConstitute message MRi
By MPKiDecryption reduction;
Using the MPK of reductioniBy MRiEncryption obtains Ei
Preferably, by MPKiDecryption restores
The encrypting module uses master key mskiWith its IDiGenerate key ski
Using Your Majesty's key mskiWith key skiTo the MPK from the sensoriThe MPK restored is decryptediWith And ID';
If ID'=IDi, then confirm the MPK that decryption obtainsiIt is true.
Because of kiIn joined the identity information ID of sensori, therefore by kiAfter decryption, ID can be therefrom extractedi, and sentence It is disconnected whether consistent with the ID of oneself, if unanimously, assert the k of decryptioniIt is very, which further improves the safeties of encryption.
Preferably, using the MPK of reductioniBy MRiEncryption obtains EiInclude:
The encrypting module chooses random number ri, MRiWith the MPK of reductioniSum be encoded to the point on elliptic curve
Calculate C1i=riG;
It calculates
Construct Ei=(C1i, C2i)。
The ciphertext E of n sensor will be sent to1,E2,E3,…EnIt polymerize and encrypts to obtain E0Include:
The encrypting module calculates
Decoding obtains
Obtain addition polymerization result
This preferred embodiment has received intelligent edge Internet of Things agent apparatus safely from Internet of Things from each sensing The ciphertext of device, and realize by polymerizeing the combination of all the sensors ciphertext, thus big on intelligent edge Internet of Things agent apparatus Width enhances safety, and then while being transmitted in local area network can resist very severe malicious attack.
It is worth noting that, intelligent edge Internet of Things agent apparatus can only be using the plaintext that private key is polymerize as a result, but not It can decrypt to obtain the clear data of each node using private key, therefore even if intelligent edge Internet of Things agent apparatus itself is insincere Appoint, but not lead to serious data leak, to improve safety.
Preferably, carrying out transmission after in Internet of Things connection by data encryption can also include:
Sensor generates random noise data;
By certain algorithm by random noise data and the data E to be transmittediIt is mixed;
Mixed data are transmitted and received by Internet of Things;
Intelligent edge Internet of Things agent apparatus extracts the data to be transmitted according to certain algorithm from mixed data.
Preferably, it includes: to generate random noise data using random number generating functon that sensor, which generates random noise data,.
Preferably, generating random noise data using random number generating functon includes: the current reading using the sensor The seed as random number generating functon is counted to generate random noise data.
The current reading of sensor is clearly completely random, generates random noise number using the random number as seed According to thoroughly prevent a possibility that external world cracks.
In addition, because directlying adopt the current internal reading of sensor, (such as sensor is accumulator monitoring, then using electricity Pressure reading, is wireless temperature monitoring, then uses temperature sensitive reading), it is clear that data source is easier, and can mitigate calculating Amount.
Preferably, last three digit currently read can be intercepted.Which in turns increases the concealments of random number.
Preferably, if there is muti-piece sensor, then multiple current readings of generation are subjected to initialization process, obtained final Random number, this makes outside invading person be more difficult to predict this random number.
Preferably, the current reading of the sensor is used to generate random noise as the seed of random number generating functon Data include:
Obtain the reading a of g Fee Schedulei, wherein i is 1-g;
Seed s=a is set1⊕a2⊕…⊕ag, wherein ⊕ is XOR operation;
Random noise data R is generated by the seed of random number generating functon of s.
This embodiment gives the preferred embodiments of initialization process, and XOR operation only takes up seldom computing resource, Will not many battery powers and processing capacity, this is for changing battery cycle especially effect using the extension sensor of small Electronic power batteries Significantly.
For the sensor of comparision of quantity of electricity abundance, such as accumulator monitoring, more complicated operation can be executed to encrypt kind Son, specific as follows:
Setting
Wherein, aminFor aiIn minimum value, amaxFor aiIn maximum value.
This preferred embodiment has created a kind of seed encrypted algorithm, so that security of system is substantially strengthened, by a large amount of Emulation practice, confirms that the Encryption Algorithm has very strong robustness, it is difficult to maliciously be cracked.
Preferably, generating random noise data R as the seed of random number generating functon using s includes:
R1=[random (s)];
R2=[random (s+1)];
R3=[random (s+2)];
R=(R1,R2,R3);
Wherein random () is random number generating functon, and [] is rounding operation.Random function random () can use city Various normal functions on field, it is important to which seed of the invention has very strong concealment, to ensure that safety.
Preferably, random noise data mix with the data to be transmitted by certain algorithm include:
It is as follows that model is set:
ε=CTxi
Mixed data are setWherein:
Xi=([xi×R1]mod N)
Yi=([yj×R2]mod M)
Zi=([zk×R3]mod 256)
In formula, 0 < x01,0 < y of <01,0 < z of <01,3.77 < γ < of <, 4.0,0 < β <, 0.15,0 < α < 0.03,0 < δ < 0.03, Xi, Yi, ZiFor matrix X, i-th of element of Y, Z, M, N are the line number and columns for the data A to be transmitted, x0, y0, z0For the 3D key seed generated at random, xi, yj, zkFor 3D chaos system output x, y, the random sequence in the direction z, 0 < i < N, 0 < j < M, 0 < k < M × N,C is that system time proofreads Separation control matrix, and ε is time check control amount.
Preferably, the Internet of Things uses PLC (Power Line Carrier, power line carrier communication), FSK (micro- function Rate wireless communication), RS485, M-BUS (Meter-Bus), zigbee (purple honeybee), at least one of LoRa and NB-IoT.
This preferred embodiment supports the Internet of Things of mainstream currently on the market, so that the technical program obtains as far as possible It promotes and applies.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to of the invention its Its embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes or Person's adaptive change follows general principle of the invention and including the undocumented common knowledge in the art of the application Or conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by following Claim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.

Claims (10)

1. a kind of intelligence edge Internet of Things agent apparatus characterized by comprising
Internet of Things communication module accesses perception control system by Internet of Things for downlink;
Local area network communications module is connected to basic service system, resource exchange system, O&M control system by local area network for uplink System;
Local area network communications module, for connecting custom system by communication network.
2. intelligence edge according to claim 1 Internet of Things agent apparatus, which is characterized in that further include encrypting module, be used for The encrypted transmission information in linkage in Internet of Things and local area network.
3. intelligence edge according to claim 2 Internet of Things agent apparatus, which is characterized in that Internet of Things communication module downlink passes through Internet of Things access perception control system in sensor network node, label read-write apparatus, audio & video equipment, intelligent equipment and Location information system.
4. intelligence edge according to claim 3 Internet of Things agent apparatus, which is characterized in that encrypting module is in Internet of Things drawn game Encrypted transmission includes in linkage in the net of domain:
The ciphertext E of n sensor will be sent to1, E2, E3... EnIt polymerize and encrypts to obtain E0For in Internet of Things online broadcast.
5. intelligence edge according to claim 4 Internet of Things agent apparatus, which is characterized in that further include:
Each sensor negotiates the basic point G of creation elliptic curve E;
The Internet of Things communication module obtains G.
6. intelligence edge according to claim 5 Internet of Things agent apparatus, which is characterized in that further include:
Sensor i creates respective key ki
Calculate respective public key MPKi=ki·G;
The Internet of Things communication module obtains MPK from Internet of Thingsi
7. intelligence edge according to claim 6 Internet of Things agent apparatus, which is characterized in that by MPKiEncrypted transmission is to Internet of Things Network Communication module includes:
The encrypting module generates Your Majesty's key mpk using key algorithmiWith master key mski
By Your Majesty's key mpkiSensor i is sent to by Internet of Things;
Sensor i is calculatedWherein, | | to press or operator,For XOR operation, IDiFor the ID of sensor i.
8. intelligence edge according to claim 7 Internet of Things agent apparatus, which is characterized in that further include:
The information that be sent to sensor i that the encrypting module receives the local area network communications module from telenet and its IDiConstitute message MRi
By MPKiDecryption reduction;
Using the MPK of reductioniBy MRiEncryption obtains Ei
9. intelligence edge according to claim 8 Internet of Things agent apparatus, which is characterized in that by MPKiDecryption restores
The encrypting module uses master key mskiWith its IDiGenerate key ski
Using Your Majesty's key mskiWith key skiTo the MPK from the sensoriThe MPK restored is decryptediAnd ID ';
If ID '=IDi, then confirm the MPK that decryption obtainsiIt is true.
10. intelligence edge according to claim 9 Internet of Things agent apparatus, which is characterized in that using the MPK of reductioniBy MRi Encryption obtains Ei and includes:
The encrypting module chooses random number ri, MRiWith the MPK of reductioniSum be encoded to the point on elliptic curve
Calculate C1i=riG;
It calculates
Construct Ei=(C1i, C2i)。
The ciphertext E of n sensor will be sent to1, E2, E3... EnIt polymerize and encrypts to obtain E0Include:
The encrypting module calculates
Decoding obtains
Obtain addition polymerization result
CN201910615042.9A 2019-07-09 2019-07-09 A kind of intelligence edge Internet of Things agent apparatus Pending CN110213300A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910615042.9A CN110213300A (en) 2019-07-09 2019-07-09 A kind of intelligence edge Internet of Things agent apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910615042.9A CN110213300A (en) 2019-07-09 2019-07-09 A kind of intelligence edge Internet of Things agent apparatus

Publications (1)

Publication Number Publication Date
CN110213300A true CN110213300A (en) 2019-09-06

Family

ID=67796846

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910615042.9A Pending CN110213300A (en) 2019-07-09 2019-07-09 A kind of intelligence edge Internet of Things agent apparatus

Country Status (1)

Country Link
CN (1) CN110213300A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111682640A (en) * 2020-04-20 2020-09-18 国网浙江桐乡市供电有限公司 Full-sensing monitoring and operation and maintenance system for power distribution room
CN111682639A (en) * 2020-04-20 2020-09-18 国网浙江桐乡市供电有限公司 Power distribution room full-perception monitoring operation and maintenance system and method based on wireless multi-hop network
CN111740493A (en) * 2020-06-02 2020-10-02 国网河北省电力有限公司邯郸供电分公司 Power switch cabinet state monitoring system based on internet of things technology
CN111784130A (en) * 2020-06-19 2020-10-16 国电南瑞南京控制系统有限公司 Power distribution network Internet of things management system, data processing method and storage medium
CN117129133A (en) * 2023-10-27 2023-11-28 南京中鑫智电科技有限公司 Online monitoring method and system for high-voltage casing pressure

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2013100351A4 (en) * 2013-03-22 2013-05-02 Huang, Xu PROF An Apparatus and Method based on dynamic window fuzzy controller for Scalar Multiplication in Elliptic Curve Cryptography on Wireless Sensor Platform
CN103581175A (en) * 2013-10-17 2014-02-12 江苏科技大学 Safe data aggregation method
CN109873815A (en) * 2019-01-28 2019-06-11 西安电子科技大学 Isomeric compound networking certification method based on edge calculations, Internet of Things security platform

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2013100351A4 (en) * 2013-03-22 2013-05-02 Huang, Xu PROF An Apparatus and Method based on dynamic window fuzzy controller for Scalar Multiplication in Elliptic Curve Cryptography on Wireless Sensor Platform
CN103581175A (en) * 2013-10-17 2014-02-12 江苏科技大学 Safe data aggregation method
CN109873815A (en) * 2019-01-28 2019-06-11 西安电子科技大学 Isomeric compound networking certification method based on edge calculations, Internet of Things security platform

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
沈杰: "物联网参考体系结构标准及应用", 《信息技术与标准化》 *
钱萍: "无线传感器网络隐私保护方法", 《电信科学》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111682640A (en) * 2020-04-20 2020-09-18 国网浙江桐乡市供电有限公司 Full-sensing monitoring and operation and maintenance system for power distribution room
CN111682639A (en) * 2020-04-20 2020-09-18 国网浙江桐乡市供电有限公司 Power distribution room full-perception monitoring operation and maintenance system and method based on wireless multi-hop network
CN111740493A (en) * 2020-06-02 2020-10-02 国网河北省电力有限公司邯郸供电分公司 Power switch cabinet state monitoring system based on internet of things technology
CN111784130A (en) * 2020-06-19 2020-10-16 国电南瑞南京控制系统有限公司 Power distribution network Internet of things management system, data processing method and storage medium
CN117129133A (en) * 2023-10-27 2023-11-28 南京中鑫智电科技有限公司 Online monitoring method and system for high-voltage casing pressure
CN117129133B (en) * 2023-10-27 2024-01-02 南京中鑫智电科技有限公司 Online monitoring method and system for high-voltage casing pressure

Similar Documents

Publication Publication Date Title
CN110213300A (en) A kind of intelligence edge Internet of Things agent apparatus
Bedi et al. Review of Internet of Things (IoT) in electric power and energy systems
Chin et al. Energy big data security threats in IoT-based smart grid communications
Kayastha et al. Smart grid sensor data collection, communication, and networking: a tutorial
Davoody-Beni et al. Application of IoT in smart grid: Challenges and solutions
CN107333265A (en) A kind of zigbee equipment method of network entry
Rana et al. IoT‐based cyber‐physical communication architecture: challenges and research directions
Sedrati et al. A survey of security challenges in internet of things
Jain et al. SCADA security: a review and enhancement for DNP3 based systems
CN213718230U (en) Safety certification device
CN111935168A (en) Industrial information physical system-oriented intrusion detection model establishing method
Albany et al. A review: Secure internet of thing system for smart houses
Chen et al. WiFi-Based home IoT communication system
Ramadan Internet of things (iot) security vulnerabilities: A review
Chalamasetty et al. Secure SCADA communication network for detecting and preventing cyber-attacks on power systems
CN110300183A (en) A kind of intelligence edge Internet of Things agent apparatus
Kumar et al. Device fingerprinting for cyber-physical systems: a survey
Bohani et al. Microgrid Communication and Security: State-Of-The-Art and Future Directions
Kuzlu et al. Internet‐based communication platform for residential DR programmes
Kim Analyses of secure authentication scheme for smart home system based on internet on things
Nagamalla et al. Notice of Violation of IEEE Publication Principles: A review of security frameworks for Internet of Things
Chae et al. Industrial control systems vulnerabilities and security issues and future enhancements
Kiarie et al. Application of spritz encryption in smart meters to protect consumer data
CN110233795A (en) A kind of edge gateway of internet of things of encryption
Zhang et al. Nonintrusive load management based on distributed edge and secure key agreement

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190906